default search action
18th TrustCom / 13th BigDataSE 2019: Rotorua, New Zealand
- 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 13th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019. IEEE 2019, ISBN 978-1-7281-2777-4
TrustCom 2019: The 18th IEEE International Conferenceon Trust, Security, and Privacy in Computing and Communications
TrustCom Trust Track
- Yunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng:
Building Trust in Container Environment. 1-9 - Kevin Theuermann:
Trustworthy Privacy-Preserving Service Compositions. 10-17 - Gul Jabeen, Ping Luo:
A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index. 18-25 - Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
MicroTEE: Designing TEE OS Based on the Microkernel Architecture. 26-33 - Nisha Malik, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach. 34-41 - Yun-Ping Tien, Wei-Chen Lin, Jan-Ming Ho, Wing-Kai Hon:
Optimal File Dissemination Scheduling Under a General Binary Tree of Trust Relationship. 42-49 - Felix Hörandner, Christof Rabensteiner:
Horcruxes for Everyone - A Framework for Key-Loss Recovery by Splitting Trust. 50-57 - Kunli Lin, Wenqing Liu, Kun Zhang, Bibo Tu:
HyperMI: A Privilege-level VM Protection Approach against Compromised Hypervisor. 58-65
TrustCom Security Track
- Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra:
The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2. 66-74 - Yang Zhang, Haichang Gao, Ge Pei, Sainan Luo, Guoqin Chang, Nuo Cheng:
A Survey of Research on CAPTCHA Designing and Breaking Techniques. 75-84 - Omaru Maruatona, Ahmad Azab, Paul A. Watters:
AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning. 85-94 - Ke He, Dong Seong Kim:
Malware Detection with Malware Images using Deep Learning Techniques. 95-102 - Salma Abdalla Hamad, Wei Emma Zhang, Quan Z. Sheng, Surya Nepal:
IoT Device Identification via Network-Flow Based Fingerprinting and Learning. 103-111 - Yongjie Huang, Qiping Yang, Jinghui Qin, Wushao Wen:
Phishing URL Detection via CNN and Attention-Based Hierarchical RNN. 112-119 - Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu:
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection. 120-127 - Karl Ott, Rabi N. Mahapatra:
Continuous Authentication of Embedded Software. 128-135 - Zhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang:
CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection. 136-143 - Chansu Han, Jumpei Shimamura, Takeshi Takahashi, Daisuke Inoue, Masanori Kawakita, Jun'ichi Takeuchi, Koji Nakao:
Real-Time Detection of Malware Activities by Analyzing Darknet Traffic Using Graphical Lasso. 144-151 - Shaofeng Zhu, Hua Chen, Wei Xi, Meihui Chen, Limin Fan, Dengguo Feng:
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs. 152-159 - Zecheng He, Aswin Raghavan, Guangyuan Hu, Sek M. Chai, Ruby B. Lee:
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. 160-167 - Lukas Zobernig, Steven D. Galbraith, Giovanni Russello:
When are Opaque Predicates Useful? 168-175 - Wenjing Cui, Yang Li, Yan Zhang, Chang Liu, Mengqi Zhan:
An Ant Colony Algorithm Based Content Poisoning Mitigation in Named Data Networking. 176-183 - Dingyu Yan, Feng Liu:
A Heuristic Method for Network Modification Against Cyber Epidemic Attacks. 184-191 - Zhangtan Li, Liang Cheng, Yang Zhang:
Tracking Sensitive Information and Operations in Integrated Clinical Environment. 192-199 - Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv:
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds. 200-207 - Shin-Ying Huang, Tao Ban:
A Topic-Based Unsupervised Learning Approach for Online Underground Market Exploration. 208-215 - Bingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai, Congli Wang, Lingjia Meng:
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors. 216-223 - Denys A. Flores, Arshad Jhumka:
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing. 224-231 - Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. 232-239 - Raphael Labaca Castro, Corinna Schmitt, Gabi Dreo:
AIMED: Evolving Malware with Genetic Programming to Evade Detection. 240-247 - Lipeng Zhu, Xiaotong Fu, Yao Yao, Yuqing Zhang, He Wang:
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware. 248-255 - Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. 256-263 - Mohammed A. Rashid, Houshyar Honar Pajooh:
A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology. 264-271 - Mahbub E. Khoda, Tasadduq Imam, Joarder Kamruzzaman, Iqbal Gondal, Ashfaqur Rahman:
Selective Adversarial Learning for Mobile Malware. 272-279 - Utkarsh Porwal, Smruthi Mukund:
Credit Card Fraud Detection in E-Commerce. 280-287 - Cole Dishington, Dilli P. Sharma, Dong Seong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson:
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks. 288-295 - Na Huang, Ming Xu, Ning Zheng, Tong Qiao, Kim-Kwang Raymond Choo:
Deep Android Malware Classification with API-Based Feature Graph. 296-303 - Hidehito Gomi, Shuji Yamaguchi, Wataru Ogami, Teruhiko Teraoka, Tatsuru Higurashi:
Context-Aware Authentication Using Co-Located Devices. 304-311 - Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu:
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection. 312-318 - Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, Jakub Szefer:
Thermal Covert Channels Leveraging Package-on-Package DRAM. 319-326 - Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, Paul Sarda:
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices. 327-333 - Amartya Sen, Kenneth K. Fletcher, Sanjay Madria:
A Secure User-Centric Framework for Dynamic Service Provisioning in IoT Environments. 334-341 - Shawn Rasheed, Jens Dietrich, Amjed Tahir:
Laughter in the Wild: A Study Into DoS Vulnerabilities in YAML Libraries. 342-349
TrustCom Privacy Track
- Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler:
HSDC-Net: Secure Anonymous Messaging in Online Social Networks. 350-357 - Fadi Hassan, David Sánchez, Jordi Soria-Comas, Josep Domingo-Ferrer:
Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings. 358-365 - Victor Morel, Mathieu Cunche, Daniel Le Métayer:
A Generic Information and Consent Framework for the IoT. 366-373 - Jiale Zhang, Junjun Chen, Di Wu, Bing Chen, Shui Yu:
Poisoning Attack in Federated Learning using Generative Adversarial Nets. 374-380 - Riad Ladjel, Nicolas Anciaux, Philippe Pucheral, Guillaume Scerri:
Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments. 381-388 - Yonghong Zhang, Peijia Zheng, Weiqi Luo:
Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain. 389-396 - Wenhao Chen, Bohang Zeng, Peijia Zheng:
A Robust Watermarking Scheme for Encrypted JPEG Bitstreams with Format-Compliant Encryption. 397-403
TrustCom Forensics and Analytics Track
- Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia:
Evolved Similarity Techniques in Malware Analysis. 404-410 - Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang:
A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering. 411-418 - Alastair Nisbet, Rijo Jacob:
TRIM, Wear Levelling and Garbage Collection on Solid State Drives: A Prediction Model for Forensic Investigators. 419-426 - Benjamin Taubmann, Alexander Böhm, Hans P. Reiser:
TwinPorter - An Architecture For Enabling the Live Migration of VMI-Based Monitored Virtual Machines. 427-434 - Vijay Naidu, Manoranjan Mohanty:
Defeating Fake Food Labels Using Watermarking and Biosequence Analysis. 435-441 - Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection. 442-449 - Xavier Francis, Hamid R. Sharifzadeh, Angus Newton, Nilufar Baghaei, Soheil Varastehpour:
Learning Wear Patterns on Footwear Outsoles Using Convolutional Neural Networks. 450-457 - Guanbo Jia, Paul Miller, Xin Hong, Harsha K. Kalutarage, Tao Ban:
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder. 458-465 - Tobias Latzo, Felix C. Freiling:
Characterizing the Limitations of Forensic Event Reconstruction Based on Log Files. 466-475 - Ranul Deelaka Thantilage, Nhien-An Le-Khac:
Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory. 476-482
TrustCom Emerging Technologies Track
- Rui Azevedo, Ibéria Medeiros, Alysson Bessani:
PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT. 483-490 - Dawei Li, Jianwei Liu, Zongxun Tang, Qianhong Wu, Zhenyu Guan:
AgentChain: A Decentralized Cross-Chain Exchange System. 491-498 - Hong Zhao, Yuexin Zhang, Xinyi Huang, Yang Xiang:
An Adaptive Physical Layer Key Extraction Scheme for Smart Homes. 499-506 - Liangrong Zhao, Jiangshan Yu:
Evaluating DAG-Based Blockchains for IoT. 507-513 - Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu:
Making Monero Hard-to-Trace and More Efficient. 514-521 - Vinay Sachidananda, Suhas Bhairav, Nirnay Ghosh, Yuval Elovici:
PIT: A Probe Into Internet of Things by Comprehensive Security Analysis. 522-529 - Jianxing Hu, Dongdong Huo, Meilin Wang, Yazhe Wang, Yan Zhang, Yu Li:
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms. 530-537 - Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu:
A Secure and Practical Blockchain Scheme for IoT. 538-545 - Xin Chen, Xinyi Huang, Yi Mu, Ding Wang:
A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction. 546-553 - Alexander Marsalek, Thomas Zefferer:
A Correctable Public Blockchain. 554-561 - Hagen Lauer, Amin Sakzad, Carsten Rudolph, Surya Nepal:
A Logic for Secure Stratified Systems and its Application to Containerized Systems. 562-569 - Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. 570-577 - Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. 578-585 - Borui Gong, Man Ho Au, Haiyang Xue:
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. 586-593 - Jack Huang, Yuan Wei Qi, Muhammad Rizwan Asghar, Andrew Meads, Yu-Cheng Tu:
MedBloc: A Blockchain-Based Secure EHR System for Sharing and Accessing Medical Data. 594-601 - SeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. 602-609 - Taehoon Eom, Jin Bum Hong, SeongMo An, Jong Sou Park, Dong Seong Kim:
Security and Performance Modeling and Optimization for Software Defined Networking. 610-617 - Ahmad Salehi Shahraki, Carsten Rudolph, Marthie Grobler:
A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains. 618-625 - Alexander Marsalek, Thomas Zefferer, Edona Fasllija, Dominik Ziegler:
Tackling Data Inefficiency: Compressing the Bitcoin Blockchain. 626-633
BigDataSE 2019: The 13th IEEE International Conferenceon Big Data Science and Engineering
- Yibing Yang, M. Omair Shafiq:
Identifying High Value Users in Twitter Based on Text Mining Approaches. 634-641 - Yuntao Wang, Zhou Su, Kuan Zhang:
A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy Blockchain. 648-654 - Yuan Qiu, Xinhong Hei, Tadashi Ohmori, Hideyuki Fujita:
An Object-Pair Driven Approach for Top-k mCK Query Problem by Using Hilbert R-Tree. 655-661 - Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. 662-669 - Yujun Huang, Yunpeng Weng, Shuai Yu, Xu Chen:
Diffusion Convolutional Recurrent Neural Network with Rank Influence Learning for Traffic Forecasting. 678-685 - Kunyuan Deng, Xiaoyong Zhang, Yijun Cheng, Zhiyong Zheng, Fu Jiang, Weirong Liu, Jun Peng:
A Remaining Useful Life Prediction Method with Automatic Feature Extraction for Aircraft Engines. 686-692 - Ran Mo, Jianfeng Liu, Wentao Yu, Fu Jiang, Xin Gu, Xiaoshuai Zhao, Weirong Liu, Jun Peng:
A Differential Privacy-Based Protecting Data Preprocessing Method for Big Data Mining. 693-699 - Bo Yin, Yu Cheng, Lin X. Cai, Xianghui Cao:
A Cooperative Edge Computing Scheme for Reducing the Cost of Transferring Big Data in 5G Networks. 700-706 - Laha Ale, Xiaojie Fang, Dajiang Chen, Ye Wang, Ning Zhang:
Lightweight Deep Learning Model For Facial Expression Recognition. 707-712 - Takayuki Sasaki, Yusuke Morita, Astha Jada:
Access Control Architecture for Smart City IoT Platform. 717-722
SECSOC-2019: The 3rd International Workshop on SecureSmart Society In Next Generation Networking Paradigm
- Shixuan Li, Dongmei Zhao:
A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation. 723-728 - Hao Cao, Xiaolong Xu, Qingxiang Liu, Yuan Xue, Lianyong Qi:
Uncertainty-Aware Resource Provisioning for Workflow Scheduling in Edge Computing Environment. 734-739 - Xiaoxiao Chi, Chao Yan, Huaizhen Kou, Lianyong Qi:
Accuracy-Aware Service Recommendation with Privacy. 740-745 - Liangfu Lu, Xiaohan Ren, Chenming Cui, Yun Luo, Yongheng Jia, Yinong Xu:
Mutual Information on Tensors for Measuring the Nonlinear Correlations in Network Security. 746-750 - Iqbal Gondal, Joarder Kamruzzaman, Leo Zhang:
One-Shot Malware Outbreak Detection using Spatio-Temporal Isomorphic Dynamic Features. 751-756 - Yanchen Qiao, Qingshan Jiang, Zhenchao Jiang, Liang Gu:
A Multi-channel Visualization Method for Malware Classification Based on Deep Learning. 757-762 - Miroslaw Kutylowski, Przemyslaw Kubiak:
Privacy and Security Analysis of PACE GM Protocol. 763-768 - Mohammed Al-Shaboti, Aaron Chen, Ian Welch:
Automatic Device Selection and Access Policy Generation Based on User Preference for IoT Activity Workflow. 769-774 - Mohammad Manzurul Islam, Gour C. Karmakar, Joarder Kamruzzaman, M. Manzur Murshed:
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors' Complementary Multimodal Data. 775-780
SST-ITS 2019: The 2019 International Workshop on Safety, Security, and Trust in Intelligent Transportation System
- Soheila Ghane Ezabadi, Alireza Jolfaei, Lars Kulik, Ramamohanarao Kotagiri:
Differentially Private Streaming to Untrusted Edge Servers in Intelligent Transportation System. 781-786 - Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman:
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data. 787-792 - Alireza Jolfaei, Krishna Kant, Hassan Shafei:
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System. 793-798 - Hussein Alnabulsi, Md. Rafiqul Islam:
Protecting Code Injection Attacks in Intelligent Transportation System. 799-806 - Feras M. Awaysheh, José Carlos Cabaleiro, Tomás Fernández Pena, Mamoun Alazab:
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges. 807-813 - Mohammad Aladwan, Feras M. Awaysheh, José Carlos Cabaleiro, Tomás F. Pena, Hamzeh Alabool, Mamoun Alazab:
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection. 814-820
DSPFT 2019: 2019 Workshop on Data Security, Privacy, Forensics and Trust
- Di Wu, Dali Zhu, Yinlong Liu, Luping Ma:
Joint RSS and CSI Based Access Point Authentication Scheme in WiFi Networks via XGBoost. 821-826 - Peter Robinson, John Brainard:
Anonymous State Pinning for Private Blockchains. 827-834 - Edward Knight, Sam Lord, Budi Arief:
Lock Picking in the Era of Internet of Things. 835-842 - Zhijun Wu, Enzhong Xu, Liang Liu, Meng Yue:
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN. 843-848 - Girish Revadigar, Chitra Javali, Yang Li, Sreejaya Viswanathan:
On the Effectiveness of Electric Network Frequency (ENF) as a Source of Randomness. 849-854
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.